id
stringlengths
12
19
title
stringlengths
0
237
description
stringlengths
35
3.87k
patches
listlengths
1
22
cwe
stringlengths
2
440
GHSA-vwf4-9qqv-87g9
null
[ { "commit_message": "[PATCH] xfs: don't BUG() on mixed direct and mapped I/O We've had reports of generic/095 causing XFS to BUG() in __xfs_get_blocks() due to the existence of delalloc blocks on a direct I/O read. generic/095 issues a mix of various types of I/O, including direct and memory mapped I/O to a sin...
null
CVE-2025-52662
A vulnerability in Nuxt DevTools has been fixed in version **2.6.4***. This issue may have allowed Nuxt auth token extraction via XSS under certain configurations. All users are encouraged to upgrade. More details: https://vercel.com/changelog/cve-2025-52662-xss-on-nuxt-devtools
[ { "commit_message": "[PATCH] fix: using `textContent` instead of `innerHtml` for auth pagechore: update lock packages/devtools/src/runtime/auth/index.html | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA3Y2FkYmJlOTNjZDE3ODk5YWYwMDM2YWU5OTFiNzRiY2Q2ODk1YjBjIE1vbiBTZXAgM...
CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
GHSA-694p-3fxc-m92h
AiondaDotCom mcp-ssh command injection vulnerability in SSH operations
null
[ { "commit_message": "[PATCH] Fix command injection vulnerability in SSH operations MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Replace unsafe exec() calls with execFile() to prevent command injection: - runRemoteCommand(): Use execFile with array arguments instead o...
null
PYSEC-2022-293
null
[ { "commit_message": "[PATCH] Define field limit for username, email and root directory #223 README.md | 11 +++++--- rdiffweb/controller/page_admin.py | 25 +++++++++++++++--- rdiffweb/controller/page_login.py | 4 +-- rdiffweb/controller/pref_general.py ...
null
GHSA-rgmj-mccj-h9mx
Cross-Site Request Forgery in Jenkins
null
[ { "commit_message": "[PATCH] [SECURITY-794] .../hudson/tools/ZipExtractionInstaller.java | 5 + .../tools/ZipExtractionInstaller/config.jelly | 2 +- .../tools/ZipExtractionInstallerTest.java | 183 ++++++++++++++++++ 3 files changed, 189 insertions(+), 1 deletion(-) create mode 100644 test/src/test/java/...
null
CVE-2024-34347
@hoppscotch/cli affected by Sandbox Escape in @hoppscotch/js-sandbox leads to RCE
@hoppscotch/cli is a CLI to run Hoppscotch Test Scripts in CI environments. Prior to 0.8.0, the @hoppscotch/js-sandbox package provides a Javascript sandbox that uses the Node.js vm module. However, the vm module is not safe for sandboxing untrusted Javascript code. This is because code inside the vm context can break out if it can get a hold of any reference to an object created outside of the vm. In the case of @hoppscotch/js-sandbox, multiple references to external objects are passed into the vm context to allow pre-request scripts interactions with environment variables and more. But this also allows the pre-request script to escape the sandbox. This vulnerability is fixed in 0.8.0.
[ { "commit_message": "[PATCH] chore: migrate `Node.js` implementation for `js-sandbox` to `isolated-vm` (#3973) Co-authored-by: Andrew Bastin <andrewbastin.k@gmail.com> .github/workflows/tests.yml | 15 +- packages/hoppscotch-cli/bin/hopp.js | 27 ++- packages/hoppscotch-cli/package.j...
CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2024-38361
Permissions processing error in spacedb
Spicedb is an Open Source, Google Zanzibar-inspired permissions database to enable fine-grained authorization for customer applications. Use of an exclusion under an arrow that has multiple resources may resolve to `NO_PERMISSION` when permission is expected. If the resource exists under *multiple* folders and the user has access to view more than a single folder, SpiceDB may report the user does not have access due to a failure in the exclusion dispatcher to request that *all* the folders in which the user is a member be returned. Permission is returned as `NO_PERMISSION` when `PERMISSION` is expected on the `CheckPermission` API. This issue has been addressed in version 1.33.1. All users are advised to upgrade. There are no known workarounds for this issue.
[ { "commit_message": "[PATCH] Fix exclusion operation in Check dispatch to *always* request the full set of results for the first branch internal/dispatch/graph/check_test.go | 261 ++++++++++++++++++ internal/graph/check.go | 7 +- internal/graph/membershipset_test.go | 2...
CWE-281: Improper Preservation of Permissions
GHSA-9475-xg6m-j7pw
Subject Confirmation Method not validated in Saml2 Authentication Services for ASP.NET
null
[ { "commit_message": "[PATCH] Fix token replay detection - Fixes #1107 - Fixes #711 Sustainsys.Saml2/Configuration/SPOptions.cs | 43 +++++++++++++------ .../SAML2P/Saml2PSecurityTokenHandler.cs | 38 ++++++++-------- Sustainsys.Saml2/SAML2P/Saml2Response.cs | 3 ++ .../Tests.Shared/Saml2P/Saml2Respons...
null
GHSA-2j97-56x9-c2hp
null
[ { "commit_message": "[PATCH] Bug Fixing assets/.htaccess | 2 +- assets/cron/backup_db.sh | 2 + assets/cron/downloadData.bat | 1 + assets/cron/sms.sh | 4 + assets/cron/uploadData.bat | ...
null
GHSA-f94q-ffqr-x638
null
[ { "commit_message": "[PATCH] nimble/mesh: Add check for rx buffer in PB ADV Validate if Transaction Continuation PDU can fit into buffer before copying data. nimble/host/mesh/src/pb_adv.c | 13 ++++++++++--- 1 file changed, 10 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA0Zjc1YzBiM2I0NjYxODZiZWZ...
null
CVE-2025-52881
runc: LSM labels can be bypassed with malicious config using dummy procfs files
runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7, 1.3.2 and 1.4.0-rc.2, an attacker can trick runc into misdirecting writes to /proc to other procfs files through the use of a racing container with shared mounts (we have also verified this attack is possible to exploit using a standard Dockerfile with docker buildx build as that also permits triggering parallel execution of containers with custom shared mounts configured). This redirect could be through symbolic links in a tmpfs or theoretically other methods such as regular bind-mounts. While similar, the mitigation applied for the related CVE, CVE-2019-19921, was fairly limited and effectively only caused runc to verify that when LSM labels are written they are actually procfs files. This issue is fixed in versions 1.2.8, 1.3.3, and 1.4.0-rc.3.
[ { "commit_message": "[PATCH] *: switch to safer securejoin.Reopen filepath-securejoin v0.3 gave us a much safer re-open primitive, we should use it to avoid any theoretical attacks. Rather than using it direcly, add a small pathrs wrapper to make libpathrs migrations in the future easier... Signed-off-by: Aleks...
CWE-61: UNIX Symbolic Link (Symlink) Following
CVE-2024-48990
Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable.
[ { "commit_message": "[PATCH] interp: do not set PYTHONPATH environment variable to prevent a LPE perl/lib/NeedRestart/Interp/Python.pm | 15 +++++++-------- 1 file changed, 7 insertions(+), 8 deletions(-)", "patch_text_b64": "RnJvbSBmY2M5YTQ0MDEzOTIyMzFiZWY0ZWY1ZWQwMjZhMGQ3YTI3NTE0OWFiIE1vbiBTZXAgMTcgMDA6MDA...
CWE-295: Improper Certificate Validation
GHSA-2h39-83vm-vq42
null
[ { "commit_message": "[PATCH] Check for mounts marked as unmounted before propagating. If the namespace were set to nil during umount (such as in Linux), checks for mnt.neverConnected() would cover this case. We keep mnt.ns as non-nil, so we need to also check umounted in some cases. PiperOrigin-RevId: 586747189...
null
PYSEC-2021-248
null
[ { "commit_message": "[PATCH] Fix heap-buffer-overflow issue with `tf.raw_ops.SparseReshape`. PiperOrigin-RevId: 371218558 Change-Id: I6a6dc5bf15b50a1d05bdd95e9ba347cb39f40f45 tensorflow/core/kernels/sparse_reshape_op.cc | 12 ++++++++++++ 1 file changed, 12 insertions(+)", "patch_text_b64": "RnJvbSAxZDA0ZDdk...
null
GHSA-h9j7-5xvc-qhg5
langchain Server-Side Request Forgery vulnerability
null
[ { "commit_message": "[PATCH] core[patch]: Further restrict recursive URL loader (#15559) Includes code from this PR: https://github.com/langchain-ai/langchain/compare/HEAD...m0kr4n3:security/fix_ssrf with additional fixes Unit tests cover new test cases libs/core/langchain_core/utils/html.py | 36 ++++++...
null
CVE-2022-30767
nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196.
[ { "commit_message": "[PATCH] CVE-2019-14196: nfs: fix unbounded memcpy with a failed length check at nfs_lookup_reply MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit This patch adds a check to rpc_pkt.u.reply.data at nfs_lookup_reply. Signed-off-by: Cheng Liu <liucheng3...
n/a
GHSA-x43w-xphx-86w3
Liferay Portal Vulnerable to XSS in the Object Module
null
[ { "commit_message": "[PATCH] LPS-159034 Avoid Stored XSS on Objects details page .../object-web/src/main/resources/META-INF/resources/init.jsp | 1 + .../object_definitions/object_definition/details.jsp | 4 ++-- 2 files changed, 3 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA1MWNjMDlmOT...
null
GHSA-mcgw-5fhw-3fq8
saleor Missing Authorization vulnerability
null
[ { "commit_message": "[PATCH] Require manage orders for fetching `user.orders` (#9128) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * Require manage orders for fetching customer.orders * Update changelog Co-authored-by: Marcin Gębala <5421321+maarcingebala@users.norep...
null
GHSA-whgm-jr23-g3j9
Uncontrolled Resource Consumption in ansi-html
null
[ { "commit_message": "[PATCH] fix: limit backtracking exposure CVE-2021-23424 index.js | 2 +- package.json | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSA3Y2I3MmEzYWJlM2NkZWMwMmIzZjlhZDhiNDBlMGZkMTE2ODg3M2U3IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBSaWNoYXJkIEdlYmhhc...
null
CVE-2017-9984
The snd_msnd_interrupt function in sound/isa/msnd/msnd_pinnacle.c in the Linux kernel through 4.11.7 allows local users to cause a denial of service (over-boundary access) or possibly have unspecified other impact by changing the value of a message queue head pointer between two kernel reads of that value, aka a "double fetch" vulnerability.
[ { "commit_message": "[PATCH] ALSA: msnd: Optimize / harden DSP and MIDI loops The ISA msnd drivers have loops fetching the ring-buffer head, tail and size values inside the loops. Such codes are inefficient and fragile. This patch optimizes it, and also adds the sanity check to avoid the endless loops. Bugzill...
n/a
CVE-2022-0894
Cross-site Scripting (XSS) - Stored in pimcore/pimcore
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.4.0.
[ { "commit_message": "[PATCH] [Admin] Security - Add handler to enable Content Security Policy (#11447) * [Admin] Security - Add handler to enable Content Security Policy * [Admin] Security - Add handler to enable Content Security Policy * [Admin] Security - Add handler to enable Content Security Policy - fix do...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-rpq8-mmwh-q9hm
Directory traversal in Eclipse Mojarra
null
[ { "commit_message": "[PATCH] Multiple Path Traversal security issues .../faces/application/resource/ClasspathResourceHelper.java | 2 +- .../com/sun/faces/application/resource/ResourceManager.java | 4 +++- .../sun/faces/application/resource/WebappResourceHelper.java | 2 +- 3 files changed, 5 insertions(+), ...
null
GHSA-pmx4-mgj6-5fc6
null
[ { "commit_message": "[PATCH] KEYS: fix dereferencing NULL payload with nonzero length sys_add_key() and the KEYCTL_UPDATE operation of sys_keyctl() allowed a NULL payload with nonzero length to be passed to the key type's ->preparse(), ->instantiate(), and/or ->update() methods. Various key types including asy...
null
GHSA-wc4p-4hcx-cmvc
null
[ { "commit_message": "[PATCH] fix: Reflected XSS via the event view - users arriving on an event view via a malicious URL with a javascript payload and then clicking on the show deleted attributes tab would trigger the payload - as reported by Jarek Kozluk from zbp.pl app/View/Elements/eventattribute.ctp | 11 ++...
null
GHSA-jf8c-hh25-c3q7
null
[ { "commit_message": "[PATCH] Open redirect vulnerability (#19577). Patch by Holger Just. git-svn-id: http://svn.redmine.org/redmine/trunk@14560 e93f8b46-1217-0410-a6f0-8f06a7374b81 app/controllers/application_controller.rb | 34 +++++++++++++++++----- test/functional/account_controller_test.rb | 11 ++++++- 2 fi...
null
GHSA-rcrv-228c-gprj
Invalid URL generation in bitlyshortener
null
[ { "commit_message": "[PATCH] Stop rewriting bit.ly with j.mp because this suddenly doesn't seem to work anymore README.md | 14 +++++++------- bitlyshortener/shortener.py | 5 +---- scripts/try_shortener.py | 4 +--- 3 files changed, 9 insertions(+), 14 deletions(-)", "patch_text_b64": "...
null
GHSA-9p26-698r-w4hx
BuildKit vulnerable to possible panic when incorrect parameters sent from frontend
null
[ { "commit_message": "[PATCH] exporter: add validation for invalid platorm Signed-off-by: Tonis Tiigi <tonistiigi@gmail.com> (cherry picked from commit d293ec3208f87fefab7a1caadffa3f3f50604796) (cherry picked from commit 42b95935d606b262a33374eeeb452bb7c299c729) client/client_test.go | 4 +++ client/...
null
GHSA-f7m8-fvp5-fpmw
null
[ { "commit_message": "[PATCH] Sanitize ItemStack meta text src/itemstackmetadata.cpp | 17 +++++++++++++++-- 1 file changed, 15 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBiNTk1NmJkZTI1OWZhYTI0MGE4MTA2MGZmNGU1OThlMjVhZDUyZGFlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBydWJlbndhcmR5IDxyd0BydWJlbnd...
null
GHSA-jmv4-pg4w-272q
null
[ { "commit_message": "[PATCH] netrom: Fix use-after-free caused by accept on already connected socket If you call listen() and accept() on an already connect()ed AF_NETROM socket, accept() can successfully connect. This is because when the peer socket sends data to sendmsg, the skb with its own sk stored in the ...
null
GHSA-vrjv-mxr7-vjf8
markdown-it-py Denial of Service vulnerability
null
[ { "commit_message": "[PATCH] =?UTF-8?q?=F0=9F=90=9B=20FIX:=20CLI=20crash=20on=20non-ut?= =?UTF-8?q?f8=20character=20(#247)?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Addresses CVE-2023-26302 markdown_it/cli/parse.py | 2 +- tests/test_cli.py | 7 +++++++ 2 f...
null
GHSA-4248-p65p-hcrm
Insecure random string generator used for sensitive data
null
[ { "commit_message": "[PATCH] [Enhancement]: Optimize insecure random number generation in function util/string.go:RandomString close: #2696 Signed-off-by: true1064 <tangjingyu@oppo.com> proto/packet.go | 2 ++ sdk/data/stream/stream_writer.go | 3 ++- util/string.go | 10 +++++...
null
PYSEC-2021-440
null
[ { "commit_message": "[PATCH] Fix an invalid address vulnerability in `tf.raw_ops.RaggedBincount`. PiperOrigin-RevId: 368293153 Change-Id: I4b4e493d3fd05e7dc55a55de3a041a80a4f275c3 tensorflow/core/kernels/bincount_op.cc | 9 +++++++++ 1 file changed, 9 insertions(+)", "patch_text_b64": "RnJvbSBlZWJiOTZjMjgzMG...
null
CVE-2025-57813
Insertion of Sensitive Information into Log File in github.com/traPtitech/traQ
traQ is a messenger application built for Digital Creators Club traP. Prior to version 3.25.0, a vulnerability exists where sensitive information, such as OAuth tokens, are recorded in log files when an error occurs during the execution of an SQL query. An attacker could intentionally trigger an SQL error by methods such as placing a high load on the database. This could allow an attacker who has the authority to view the log files to illicitly acquire the recorded sensitive information. This vulnerability has been patched in version 3.25.0. If upgrading is not possible, a temporary workaround involves reviewing access permissions for SQL error logs and strictly limiting access to prevent unauthorized users from viewing them.
[ { "commit_message": "[PATCH 1/2] =?UTF-8?q?chore(gorm):=20=E4=B8=80=E6=99=82=E7=9A=84?= =?UTF-8?q?=E3=81=ABGORM=E3=81=AE=E3=83=AD=E3=82=B0=E3=82=92=E5=88=87?= =?UTF-8?q?=E3=82=8B?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit cmd/serve.go | 3 ++- 1 file changed, 2 in...
CWE-532: Insertion of Sensitive Information into Log File
GHSA-vgqx-447m-wvcj
Liferay Portal Vulnerable to DoS via Crafted Headless API Request
null
[ { "commit_message": "[PATCH] LPS-191342 SF .../context/provider/test/PaginationContextProviderTest.java | 2 -- 1 file changed, 2 deletions(-)", "patch_text_b64": "RnJvbSA1ZjVjNzM5MTNiMGU3Mjg3ZjdkZTBiNGUxOTk4N2NjNTc4NDRiNjkxIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBCcmlhbiBDaGFuIDxicmlhbi5jaGFuQGxpZmVyYX...
null
CVE-2025-64485
CVAT: Mounted share file overwrite via crafted request
CVAT is an open source interactive video and image annotation tool for computer vision. In versions 2.4.0 through 2.48.1, a malicious CVAT user with at least the User global role may create files in the root of the mounted file share, or overwrite existing files. If no file share is mounted, the user will be able to create files in the share directory of the import worker container, potentially filling up disk space. This issue is fixed in version 2.49.0.
[ { "commit_message": "[PATCH] Merge commit from fork This causes at least one security vulnerability: if the user passes `{\"storage\": \"share\", \"remote_files\": [...]}`, then the specified files will be downloaded to the share directory (potentially overwriting what was in there before). There is already cod...
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
GHSA-xcxh-6cv4-q8p8
HFS user adding a "web link" in HFS is vulnerable to "target=_blank" exploit
null
[ { "commit_message": "[PATCH] fix: missing noopener for external links https://github.com/rejetto/hfs/security/advisories/GHSA-xcxh-6cv4-q8p8 frontend/src/fileMenu.ts | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSA2NTMxYmNkMmFiMjg1YWY4OGY5MTgzMWUzMGQ4YTAzZjViOWZlMjBkIE1vbiBTZXAgMTcgMDA6MDA6...
null
PYSEC-2023-74
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-j8r2-6x86-q33q requests/sessions.py | 4 +++- tests/test_requests.py | 20 ++++++++++++++++++++ 2 files changed, 23 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA3NGVhN2NmN2E2YTI3YTRlZWIyYWUyNGUxNjJiY2M5NDJhNjcwNmQ1IE1vbiBTZXAgMTcgMDA6MDA...
null
CVE-2023-23004
In the Linux kernel before 5.19, drivers/gpu/drm/arm/malidp_planes.c misinterprets the get_sg_table return value (expects it to be NULL in the error case, whereas it is actually an error pointer).
[ { "commit_message": "[PATCH] malidp: Fix NULL vs IS_ERR() checking The get_sg_table() function does not return NULL. It returns error pointers. Signed-off-by: Miaoqian Lin <linmq006@gmail.com> Signed-off-by: Liviu Dudau <liviu.dudau@arm.com> Link: https://lore.kernel.org/dri-devel/20211213072115.18098-1-linmq00...
n/a
GHSA-vh2c-hfhf-4v64
null
[ { "commit_message": "[PATCH] fix:tag xss admin/article_save.php | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA1YmY3YTc5ODI2ZTBlYTA5YmNjOGEyMWY2OWEwYzc0MTA3NzYxYTAyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBzbm93IDxlbWxvb2dAZ21haWwuY29tPgpEYXRlOiBXZWQsIDkgTm92IDIwMjIgMDA6NT...
null
GHSA-96p2-24jg-gc5w
null
[ { "commit_message": "[PATCH] Extend stack when pushing arguments that does not fit in; fix #4038 mrbgems/mruby-fiber/src/fiber.c | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-)", "patch_text_b64": "RnJvbSA3Nzg1MDA1NjNhOWY3Y2ViYTk5NjkzN2RjODg2YmQ4Y2RlMjliNDJiIE1vbiBTZXAgMTcgMDA6MDA6MD...
null
GHSA-37rg-pmjm-jjg7
null
[ { "commit_message": "[PATCH] Sync changes docs/NEWS | 5 ++++- include/admin/images.inc.php | 2 +- serendipity_config.inc.php | 2 +- templates/2k11/admin/category.inc.tpl | 4 ++-- 4 files changed, 8 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSBlMmE...
null
GHSA-xfwj-2f34-32f5
Jenkins Groovy Plugin sandbox bypass vulnerability
null
[ { "commit_message": "[PATCH] [SECURITY-1293] Secure the script check in StringScriptSource pom.xml | 8 +-- .../plugins/groovy/StringScriptSource.java | 3 +- .../groovy/StringScriptSourceTest.java | 61 +++++++++++++++++++ 3 files changed, 67 insertions(+), 5 dele...
null
GHSA-7945-5mcv-f2pp
LibOSDP vulnerable to a null pointer deref in osdp_reply_name
null
[ { "commit_message": "[PATCH] Fix null pointer deref issue osdp_reply_name Signed-off-by: Siddharth Chandrasekaran <sidcha.dev@gmail.com> src/osdp_common.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAyNDQwOWU5OGEyNjAxNzY3NjU5NTZlYzc2NmEwNGNiMzU5ODRmYWIxIE1vbiBTZXAgMTcgMDA...
null
GHSA-5v5w-44w6-q5hv
Erlang Solutions MongooseIM vulnerable to denial of service (DoS) via crafted XMPP stream
null
[ { "commit_message": "[PATCH 1/3] Add zlib inflated data size limit apps/ejabberd/c_src/ejabberd_zlib_drv.c | 151 +++++++++++++----------- apps/ejabberd/src/ejabberd_c2s.erl | 13 +- apps/ejabberd/src/ejabberd_socket.erl | 7 +- apps/ejabberd/src/ejabberd_zlib.erl | 13 +- apps/ejabberd/src/mod_bosh_...
null
CVE-2022-1592
Server-Side Request Forgery in scout in clinical-genomics/scout
Server-Side Request Forgery in scout in GitHub repository clinical-genomics/scout prior to v4.42. An attacker could make the application perform arbitrary requests to fishing steal cookie, request to private area, or lead to xss...
[ { "commit_message": "[PATCH] Protect remote_cors from Server-Side Request Forgery (#3326) * Protect remote_cors from Server-Side Request Forgery * Improved code and added test * Fix a couple of comments in a test CHANGELOG.md | 1 + .../blueprints/alignviewers/controllers.py ...
CWE-918 Server-Side Request Forgery (SSRF)
PYSEC-2020-316
null
[ { "commit_message": "[PATCH] Fix multiple vulnerabilities in `tf.raw_ops.*CountSparseOutput`. Also add tests for these API points, both for the happy paths and for the vulnerable ones. PiperOrigin-RevId: 332563222 Change-Id: Ib3b52116a83a134c2e742a7c66e5e956db8fba05 tensorflow/core/kernels/count_ops.cc | ...
null
GHSA-mr4x-c4v9-x729
aiohttp-session creates non-expiring sessions
null
[ { "commit_message": "[PATCH] Empty session data if session age > max_age (#331) aiohttp_session/__init__.py | 7 +++++-- tests/test_nacl_storage.py | 33 ++++++++++++++++++++++++++++++++- 2 files changed, 37 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAxYjM1NmYwMWJiYWI1N2QwNDFjOWE3NWJhY2Q3MmZiY...
null
GHSA-9f9p-cp3c-72jf
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') in trillium-http and trillium-client
null
[ { "commit_message": "[PATCH] fix(security): allow all tchar in header names http/src/headers/unknown_header_name.rs | 30 ++++++++++++++++++++++--- 1 file changed, 27 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAxNmE0MmIzZjgzNzhhM2ZhNGU2MWVjZTNlM2UzN2U2YTUzMGRmNTFkIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjA...
null
GHSA-5f9h-9pjv-v6j7
Directory traversal in Rack::Directory app bundled with Rack
null
[ { "commit_message": "[PATCH] Use Dir.entries instead of Dir[glob] to prevent user-specified glob metacharacters [CVE-2020-8161] lib/rack/directory.rb | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBkZGRiN2FkMThlZDc5Y2E2YWIwNmNjYzQxN2ExNjlmZGU0NTEyNDZlIE1vbiBTZXAgMTcgMDA6MD...
null
CVE-2022-24896
Tracker report renderer and chart widgets leak information in Tuleap
Tuleap is a Free & Open Source Suite to manage software developments and collaboration. In versions prior to 13.7.99.239 Tuleap does not properly verify authorizations when displaying the content of tracker report renderer and chart widgets. Malicious users could use this vulnerability to retrieve the name of a tracker they cannot access as well as the name of the fields used in reports.
[ { "commit_message": "[PATCH] request #26729 Tracker report renderer and chart widgets leak information user cannot access Tracker report renderer and chart widgets leak information user cannot access Change-Id: Ibdd7d1b8e72dd44bbb2b747b7d8f264603f98024 .../data-access/GraphOnTrackersV5_ChartFactory.class.php |...
CWE-862: Missing Authorization
GHSA-4c87-9xq5-5c35
Content-Security-Policy protection for user content disabled by Jenkins ZAP Pipeline Plugin
null
[ { "commit_message": "[PATCH] Report uses regex when checking URIs for false positives. False positive file is found in the workspace not the root. All static files required for report are saved, can now use the Jenkins Resource Root URL and no longer need to disable the Content Security Policy. .../java/com/vro...
null
CVE-2022-41937
Missing Authorization in XWiki Platform
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. The application allows anyone with view access to modify any page of the wiki by importing a crafted XAR package. The problem has been patched in XWiki 14.6RC1, 14.6 and 13.10.8. As a workaround, setting the right of the page Filter.WebHome and making sure only the main wiki administrators can view the application installed on main wiki or edit the page and apply the changed described in commit fb49b4f.
[ { "commit_message": "[PATCH] XWIKI-19758: Better control in Filter application .../src/main/resources/Filter/WebHome.xml | 21 ++++++++++++++----- 1 file changed, 16 insertions(+), 5 deletions(-)", "patch_text_b64": "RnJvbSBmYjQ5YjRmMjg5ZWUyOGU0NWNmYWRhOGU5N2UzMjBjZDNlZDI3MTEzIE1vbiBTZXAgMTcgMDA6MDA6MDAg...
CWE-862: Missing Authorization
GHSA-997w-mjqx-37fq
null
[ { "commit_message": "[PATCH] #000 - Add missing Content-Type check .../go/apiv1/backupconfig/BackupConfigControllerV1.java | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA3ZDBiYWFiMGQzNjFjMzc3YWY4NDk5NGY5NWJhNzZjMjgwMDQ4NTQ4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOi...
null
GHSA-hf3c-wxg2-49q9
vLLM vulnerable to Denial of Service by abusing xgrammar cache
null
[ { "commit_message": "[PATCH] [Core] Upgrade to xgrammar 0.1.18, add cache size limit (#16283) Signed-off-by: Russell Bryant <rbryant@redhat.com> requirements/common.txt | 2 +- vllm/envs.py | 7 +++++++ vllm/model_executor/guided_decodin...
null
CVE-2016-10049
Buffer overflow in the ReadRLEImage function in coders/rle.c in ImageMagick before 6.9.4-4 allows remote attackers to cause a denial of service (application crash) or have other unspecified impact via a crafted RLE file.
[ { "commit_message": "[PATCH] https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=29710 coders/rle.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAzZTkxNjUyODVlZGE2ZTFiYjcxMTcyMDMxZDMwNDhiNTFiYjQ0M2E0IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDcmlzdHkgPHVy...
n/a
GHSA-fq9q-7wp8-gpr7
null
[ { "commit_message": "[PATCH] Fix handling of symbolic link ACLs On Linux ACLs on symbolic links are not supported. We must avoid calling acl_set_file() on symbolic links as their targets are modified instead. While here, do not try to set default ACLs on non-directories. Fixes #1565 libarchive/archive_disk_acl_...
null
GHSA-4gfx-p2j4-w2vh
Alkacon OpenCMS XSS via title and requestedResource parameters
null
[ { "commit_message": "[PATCH] Fixed some XSS problems (github issue #173) src/org/opencms/util/CmsStringUtil.java | 3 +++ src/org/opencms/workplace/CmsDialog.java | 10 +++++++++- 2 files changed, 12 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA3MmEwNWUzZWExY2Y2OTJlMmVmY2UwMDI2ODcyNzJlNjNmOThjMT...
null
CVE-2022-45909
drachtio-server before 0.8.19 has a heap-based buffer over-read via a long Request-URI in an INVITE request.
[ { "commit_message": "[PATCH] sending an invite with a request-uri longer than 255 characters can cause a crash (#238) src/drachtio.cpp | 16 +++++++++------- src/sip-dialog-controller.cpp | 4 +++- 2 files changed, 12 insertions(+), 8 deletions(-)", "patch_text_b64": "RnJvbSBhNjNkMDE4NTQ5ODdkOWZ...
n/a
GHSA-8fg7-x4v8-wv65
null
[ { "commit_message": "[PATCH] More integer overflow (see bug #187) Make sure that 'width + alignment' doesn't overflow, otherwise it could create a SDL_Surface of 'width' but with wrong 'pitch' SDL_ttf.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSBkYjFiNDFhYjhiZGU2N...
null
GHSA-cj8w-v588-p8wx
pf4j vulnerable to remote code execution via expandIfZip method in the extract function
null
[ { "commit_message": "[PATCH] Add security checks to prevent directory traversal when decompressing (#538) pf4j/src/main/java/org/pf4j/util/Unzip.java | 14 +++-- .../test/java/org/pf4j/util/UnzipTest.java | 60 +++++++++++++++++++ 2 files changed, 70 insertions(+), 4 deletions(-) create mode 100644 pf4j/src/...
null
GHSA-mm7v-vpv8-xfc3
Double free in smallvec
null
[ { "commit_message": "[PATCH] Fix using `grow` to the same size. lib.rs | 16 ++++++++++++++++ 1 file changed, 16 insertions(+)", "patch_text_b64": "RnJvbSA0YmEwZDBmNjg5NDQwOTYzZTM4YjhhZGJlN2ZjMmNhYmM2ZTU3M2Q1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBFcmljIEh1c3MgPGVyaWNAaHVzcy5vcmc+CkRhdGU6IFRodSwgNiBKdW4gM...
null
GHSA-h9w4-3hv9-j8r3
null
[ { "commit_message": "[PATCH] handle expired token being null and prevent constant rerender (#956) * handle expired token being null and prevent constant rerender * reset defaults frontend/src/components/Modals/Password/index.jsx | 10 ++++++---- frontend/src/components/PrivateRoute/index.jsx | 2 +- frontend/...
null
PYSEC-2021-550
null
[ { "commit_message": "[PATCH] Fix accessing possible nullptr in tensorflow::data::CompressElement and UncompressElement which are used in tf.data.service. PiperOrigin-RevId: 373920841 Change-Id: Ia88d78aee09fa19bb53a0f163fd19620d0c68743 tensorflow/core/data/compression_utils.cc | 22 +++++++++++++++------- 1 file...
null
GHSA-23q2-5gf8-gjpp
Enabling Authentication does not close all logged in socket connections immediately
null
[ { "commit_message": "[PATCH] Merge pull request from GHSA-23q2-5gf8-gjpp server/server.js | 6 ++++++ 1 file changed, 6 insertions(+)", "patch_text_b64": "RnJvbSA3YTllMmY1ZGU2OWFhMGJiODg0ZWFkMjVkMWRjYzgzM2JiOGM2NTc5IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBMb3VpcyBMYW0gPGxvdWlzbGFtQHVzZXJzLm5vcmVwbHkuZ2l0aH...
null
GHSA-r8j4-96mx-rjcc
Improper Restriction of XML External Entity Reference in skylot/jadx
null
[ { "commit_message": "[PATCH] fix: use secure xml parser for process manifest .../src/main/java/jadx/core/export/ExportGradleProject.java | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBkMjJkYjMwMTY2ZTdjYjM2OWQ3MmJlNDEzODJiYjYzYWM4YjgxYzUyIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjA...
null
CVE-2022-0824
Improper Access Control to Remote Code Execution in webmin/webmin
Improper Access Control to Remote Code Execution in GitHub repository webmin/webmin prior to 1.990.
[ { "commit_message": "[PATCH] Foreign module may need a check web-lib-funcs.pl | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSAzOWVhNDY0ZjBjNDBiMzI1ZGVjZDZhNWJmYjc4MzNmYTRhMTQyZTM4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBJbGlhIFJvc3RvdnRzZXYgPGlsaWFAcm9zdG92dHNldi5pbz4KRG...
CWE-284 Improper Access Control
PYSEC-2021-479
null
[ { "commit_message": "[PATCH] Validate (and ensure validation sticks) inputs for `MatrixTriangularSolve`. PiperOrigin-RevId: 370282444 Change-Id: Iaed61a0b0727cc42c830658b72eb69f785f48dc5 .../linalg/matrix_triangular_solve_op_impl.h | 20 +++++++++++++++---- 1 file changed, 16 insertions(+), 4 deletions(-)", ...
null
GHSA-6q9c-m9fr-865m
vet MCP Server SSE Transport DNS Rebinding Vulnerability
null
[ { "commit_message": "[PATCH] fix: mcp SSE hardening (#587) cmd/server/mcp.go | 33 +++- docs/mcp.md | 58 +++++- go.mod | 1 - go.sum | 12 -- mcp/server/guard.go | 56 ++++++ mcp/server/guard_test.go...
null
CVE-2002-2443
schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.
[ { "commit_message": "[PATCH] Fix kpasswd UDP ping-pong [CVE-2002-2443] The kpasswd service provided by kadmind was vulnerable to a UDP \"ping-pong\" attack [CVE-2002-2443]. Don't respond to packets unless they pass some basic validation, and don't respond to our own error packets. Some authors use CVE-1999-010...
n/a
CVE-2023-44467
langchain_experimental (aka LangChain Experimental) in LangChain before 0.0.306 allows an attacker to bypass the CVE-2023-36258 fix and execute arbitrary code via __import__ in Python code, which is not prohibited by pal_chain/base.py.
[ { "commit_message": "[PATCH] fix code injection vuln (#11233) - **Description:** Fix a code injection vuln by adding one more keyword into the filtering list - **Issue:** N/A - **Dependencies:** N/A - **Tag maintainer:** - **Twitter handle:** Co-authored-by: Eugene Yurtsev <eyurtsev@gmail.com> libs/experimental...
n/a
CVE-2021-21244
Pre-Auth SSTI via Bean validation message tampering
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, There is a vulnerability that enabled pre-auth server side template injection via Bean validation message tampering. Full details in the reference GHSA. This issue was fixed in 4.0.3 by disabling validation interpolation completely.
[ { "commit_message": "[PATCH] fix issue #88: Users able to edit build spec can execute arbitrary java code server-core/src/main/java/io/onedev/server/CoreModule.java | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA0ZjVkYzZmYjllNTBmMmM0MWM0OTI5YjBkOGM1ODI0YjJjY2EzZDY1IE1v...
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
GHSA-5gwh-r76w-934h
Qualys Jenkins Plugin for WAS XML External Entity vulnerability
null
[ { "commit_message": "[PATCH] Remove unused code. .../qualys/plugins/wasPlugin/util/Helper.java | 27 ------------------- 1 file changed, 27 deletions(-)", "patch_text_b64": "RnJvbSBiNGVlYjM0NzQ3ZmExYjkzNGFiYmRmNjg2MTAyZjY0OTVmZGIwMmVlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBTaHViaGFtIFJhaSA8c3JhaUBxdWFseXM...
null
GHSA-mf9q-87xx-jgvv
Liferay Portal allows unrestricted upload of file in the style books component
null
[ { "commit_message": "[PATCH] LPD-42742 validate style book thumbnail file extension ...StyleBookEntryPreviewMVCActionCommand.java | 107 +++++++++++------- ...eBookEntryActionDropdownItemsProvider.java | 2 + .../resources/META-INF/resources/init.jsp | 1 + .../resources/META-INF/resources/view.jsp | ...
null
GHSA-vfm9-6w88-hcvc
null
[ { "commit_message": "[PATCH] Fix crash in anal.avr libr/anal/p/anal_avr.c | 3 +++ 1 file changed, 3 insertions(+)", "patch_text_b64": "RnJvbSAwNDFlNTNjYWI3Y2EzMzQ4MWFlNDVlY2Q2NWFkNTk2OTc2ZDc4ZTY4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBwYW5jYWtlIDxwYW5jYWtlQG5vcGNvZGUub3JnPgpEYXRlOiBGcmksIDIwIEFwciAyMDE4I...
null
GHSA-vh6g-786f-hxxp
Zope XSS Vulnerability
null
[ { "commit_message": "[PATCH] Prep 2.12.22 release with CVE-2010-1104 fix. doc/CHANGES.rst | 4 +++- setup.py | 2 +- src/OFS/SimpleItem.py | 3 ++- src/ZPublisher/tests/exception_handling.txt | 4 ++-- 4 files changed, 8 insertions...
null
GHSA-4w54-wwc9-x62c
Silverpeas authentication bypass
null
[ { "commit_message": "[PATCH] ug #14156 Fix the vuln by defined a dedicated attribute in AuthenticationCredentials for authentication successfully performed outside of Silverpeas. .../AuthenticationCredential.java | 23 +++++++++++++------ .../authentication/AuthenticationService.java | 8 +++---- ......
null
GHSA-g4xv-964r-xrmr
null
[ { "commit_message": "[PATCH] Security: Fix SQL injection and likely future similar issues main/inc/lib/CoursesAndSessionsCatalog.class.php | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBiZmExZWNjZmFiYjQ1N2I4MDA2MThkOWQxMTVmMTJkYzYxNGE1NWRmIE1vbiBTZXAgMTcgMDA6MDA6MDA...
null
PYSEC-2021-180
null
[ { "commit_message": "[PATCH] Fix `tf.raw_ops.CTCGreedyDecoder` CHECK failure. PiperOrigin-RevId: 369960465 Change-Id: If0b8b3264d5a47a24ac0970ed7b81ce6b4921fae tensorflow/core/kernels/ctc_decoder_ops.cc | 2 ++ 1 file changed, 2 insertions(+)", "patch_text_b64": "RnJvbSBlYTNiNDNlOThjMzJjOTdiMzVkNTJiNGM2NmY5M...
null
GHSA-hfqx-732w-xrrw
null
[ { "commit_message": "<31488909+miss-islington@users.noreply.github.com> [PATCH] [3.14] gh-142145: Remove quadratic behavior in node ID cache clearing (GH-142146) (#142209) gh-142145: Remove quadratic behavior in node ID cache clearing (GH-142146) * Remove quadratic behavior in node ID cache clearing * Add news ...
null
GHSA-pg2p-q27f-4f79
null
[ { "commit_message": "[PATCH] fixed major security flaw in Trigger plugin src/lib/Server/Plugins/Trigger.py | 40 +++++++++++++++++++------------ 1 file changed, 25 insertions(+), 15 deletions(-)", "patch_text_b64": "RnJvbSBhNTI0OTY3ZThkNWM0YzIyZTQ5Y2Q2MTlhZWQyMGM4N2EzMTZjMGJlIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwM...
null
GHSA-h8xj-q927-5546
null
[ { "commit_message": "[PATCH] https://www.imagemagick.org/discourse-server/viewtopic.php?f=3&t=31161 ChangeLog | 4 ++++ coders/tiff.c | 5 +++-- 2 files changed, 7 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSBjMDczYTc3MTJkODI0NzZiNWZiZWU3NDg1NmM0NmI4OGFmOWMzMTc1IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjA...
null
GHSA-m5gv-m5f9-wgv4
Grafana Agent (Flow mode) on Windows has Unquoted Search Path or Element vulnerability
null
[ { "commit_message": "[PATCH] fix win registry (#7045) CHANGELOG.md | 7 +++++++ packaging/grafana-agent-flow/windows/install_script.nsis | 2 +- 2 files changed, 8 insertions(+), 1 deletion(-)", "patch_text_b64": "RnJvbSA5MWJhYjJjMDU5MDY5MzhkM2Y4ZTFlM2M2MWE4NjNmMDM3...
null
GHSA-w5fx-fh39-j5rw
Codex has sandbox bypass due to bug in path configuration logic
null
[ { "commit_message": "[PATCH] fix: ensure cwd for conversation and sandbox are separate concerns (#3874) Previous to this PR, both of these functions take a single `cwd`: https://github.com/openai/codex/blob/71038381aa0f51aa62e1a2bcc7cbf26a05b141f3/codex-rs/core/src/seatbelt.rs#L19-L25 https://github.com/openai/...
null
GHSA-589w-hccm-265x
Inline attribute values were not processed.
null
[ { "commit_message": "[PATCH] refs #1313 Escape inline attributes (#1314) CHANGELOG.md | 5 +++++ src/Platform/Dashboard.php | 2 +- src/Screen/Field.php | 10 ++++++---- src/Screen/Fields/Upload.php | 1 - tests/Unit/Screen/Fields/InputTest.php | ...
null
CVE-2017-15733
In phpMyFAQ before 2.9.9, there is Cross-Site Request Forgery (CSRF) in admin/ajax.attachment.php and admin/att.main.php.
[ { "commit_message": "[PATCH] Added missing CSRF protection phpmyfaq/admin/ajax.attachment.php | 13 +++++++++---- phpmyfaq/admin/att.main.php | 7 ++++--- 2 files changed, 13 insertions(+), 7 deletions(-)", "patch_text_b64": "RnJvbSBlZjVhNjZkZjRiY2ZhY2M3NTczMzIyYWYzM2NlMTBjMzBlMGJiODk2IE1vbiBTZXAgMTcg...
n/a
CVE-2017-5553
Cross-site scripting (XSS) vulnerability in plugins/markdown_plugin/_markdown.plugin.php in b2evolution before 6.8.5 allows remote authenticated users to inject arbitrary web script or HTML via a javascript: URL.
[ { "commit_message": "[PATCH] Ignore wrong urls on markdown plugin plugins/markdown_plugin/_parsedown.inc.php | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBjZTViMzZlNDRiNzE0YjE4YjBiY2QzNGM2ZGIwMTg3YjhkMTNiYWI4IE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiB5dXJhYmFraHRp...
n/a
CVE-2022-39265
Mail settings' command parameter injection in mybb
MyBB is a free and open source forum software. The _Mail Settings_ → Additional Parameters for PHP's mail() function mail_parameters setting value, in connection with the configured mail program's options and behavior, may allow access to sensitive information and Remote Code Execution (RCE). The vulnerable module requires Admin CP access with the `_Can manage settings?_` permission and may depend on configured file permissions. MyBB 1.8.31 resolves this issue with the commit `0cd318136a`. Users are advised to upgrade. There are no known workarounds for this vulnerability.
[ { "commit_message": "[PATCH] Fix Mail settings command parameter injection inc/functions.php | 4 ++-- install/resources/settings.xml | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSAwY2QzMTgxMzZhMTBiMDI5YmI1YzhhOGY2ZGRkZjM5ZDg3NTE5Nzk3IE1vbiBTZXAgMTcgMDA6MDA6M...
CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CVE-2018-15859
Unchecked NULL pointer usage when parsing invalid atoms in ExprResolveLhs in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because lookup failures are mishandled.
[ { "commit_message": "[PATCH] Fail expression lookup on invalid atoms If we fail atom lookup, then we should not claim that we successfully looked up the expression. Signed-off-by: Daniel Stone <daniels@collabora.com> src/xkbcomp/expr.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-)", "patch_text_...
n/a
CVE-2015-3309
Directory traversal vulnerability in node/utils/Minify.js in Etherpad 1.1.2 through 1.5.4 allows remote attackers to read arbitrary files with permissions of the user running the service via a .. (dot dot) in the path parameter of HTTP API requests. NOTE: This vulnerability is due to an incomplete fix to CVE-2015-3297.
[ { "commit_message": "[PATCH] dont allow directory traversal #2 src/node/utils/Minify.js | 1 - 1 file changed, 1 deletion(-)", "patch_text_b64": "RnJvbSAwZmE3NjUwZGY4Zjk0MGVkNmI1NzdkNzk4MzZhNzhlYjA5NzI2YzRiIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBsb3VpcyA8bG91aXNAc3lzdGVtbGkub3JnPgpEYXRlOiBTdW4sIDEyIEFwciA...
n/a
GHSA-2mhh-w6q8-5hxw
Remote Memory Disclosure in ws
null
[ { "commit_message": "[PATCH] [fix] Prevent allocation of memory through ping frames lib/Sender.js | 8 ++++++++ lib/WebSocket.js | 2 +- test/WebSocket.test.js | 19 ++++++++++++++++++- 3 files changed, 27 insertions(+), 2 deletions(-)", "patch_text_b64": "RnJvbSAyOTI5M2VkMTFiNjc5ZTAzNjZmYTBmN...
null
CVE-2023-40572
XWiki Platform vulnerable to CSRF privilege escalation/RCE via the create action
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. The create action is vulnerable to a CSRF attack, allowing script and thus remote code execution when targeting a user with script/programming right, thus compromising the confidentiality, integrity and availability of the whole XWiki installation. When a user with script right views this image and a log message `ERROR foo - Script executed!` appears in the log, the XWiki installation is vulnerable. This has been patched in XWiki 14.10.9 and 15.4RC1 by requiring a CSRF token for the actual page creation.
[ { "commit_message": "[PATCH] XWIKI-20849: Require a CSRF token in the create action .../java/com/xpn/xwiki/web/CreateAction.java | 12 +- .../com/xpn/xwiki/web/CreateActionTest.java | 160 ++++++++---------- .../main/resources/templates/createinline.vm | 1 + 3 files changed, 80 insertions(+), 93 deletions(...
CWE-352: Cross-Site Request Forgery (CSRF)
CVE-2018-18674
GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "board tail contents" parameter, aka the adm/board_form_update.php bo_content_tail parameter.
[ { "commit_message": "[PATCH] =?UTF-8?q?XSS=20=EC=B7=A8=EC=95=BD=EC=A0=90=20=EC=88=98?= =?UTF-8?q?=EC=A0=95?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit adm/board_form_update.php | 3 +++ adm/boardgroup_form.php | 2 +- adm/config_form.php | 2 +- adm/con...
n/a
GHSA-v778-237x-gjrc
Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto
null
[ { "commit_message": "[PATCH] ssh: make the public key cache a 1-entry FIFO cache Users of the the ssh package seem to extremely commonly misuse the PublicKeyCallback API, assuming that the key passed in the last call before a connection is established is the key used for authentication. Some users then make aut...
null
CVE-2022-0352
Cross-site Scripting (XSS) - Reflected in janeczku/calibre-web
Cross-site Scripting (XSS) - Reflected in Pypi calibreweb prior to 0.6.16.
[ { "commit_message": "[PATCH] Prevent wrong use of safe statement cps/templates/author.html | 8 +- test/Calibre-Web TestSummary_Linux.html | 196 +++++++++++------------- 2 files changed, 95 insertions(+), 109 deletions(-)", "patch_text_b64": "RnJvbSA2YmYwNzUzOTc4ODAwNDUxM2MzNjkyYzA3NGViYzdiYT...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
GHSA-ppj4-34rq-v8j9
github.com/tidwall/gjson Vulnerable to REDoS attack
null
[ { "commit_message": "[PATCH] Update match dependency This commit updates the github.com/tidwall/match library, which address an issue where it's possible to produce a ReDos attack. fixes #236 go.mod | 2 +- go.sum | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-)", "patch_text_b64": "RnJvbSA1OTAwMTBm...
null
CVE-2019-14980
In ImageMagick 7.x before 7.0.8-42 and 6.x before 6.9.10-42, there is a use after free vulnerability in the UnmapBlob function that allows an attacker to cause a denial of service by sending a crafted file.
[ { "commit_message": "[PATCH] https://github.com/ImageMagick/ImageMagick6/issues/43 magick/blob.c | 1 + 1 file changed, 1 insertion(+)", "patch_text_b64": "RnJvbSA2MTRhMjU3Mjk1YmRjZGVkYTM0NzA4Njc2MTA2MmFjNzY1OGI2ODMwIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBDcmlzdHkgPG1pa2F5bGEtZ3JhY2VAdXJiYW4td2Fycmlvci5vc...
n/a
GHSA-f6m2-5v5j-rhf2
null
[ { "commit_message": "[PATCH] OGRExpatRealloc(): fix double-free when size to allocate is above the default 10MB threshold. Fixes https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16178. Credit to OSS Fuzz gdal/ogr/ogr_expat.cpp | 1 - 1 file changed, 1 deletion(-)", "patch_text_b64": "RnJvbSAxNDgxMTVmY2M...
null
CVE-2023-4422
Cross-site Scripting (XSS) - Stored in cockpit-hq/cockpit
Cross-site Scripting (XSS) - Stored in GitHub repository cockpit-hq/cockpit prior to 2.6.3.
[ { "commit_message": "[PATCH] make assets uploading more secure modules/Assets/bootstrap.php | 14 ++++++++++---- 1 file changed, 10 insertions(+), 4 deletions(-)", "patch_text_b64": "RnJvbSBiOGRhZDVlMDcwNjA4YmI1ZTRlYzU4ZmFiYmVlMTAxYjVhZjczN2NmIE1vbiBTZXAgMTcgMDA6MDA6MDAgMjAwMQpGcm9tOiBBcnR1ciBIZWluemUgPGFydH...
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2022-36088
GoCD Windows installations outside default location inadequately restrict installation file permissions
GoCD is a continuous delivery server. Windows installations via either the server or agent installers for GoCD prior to 22.2.0 do not adequately restrict permissions when installing outside of the default location. This could allow a malicious user with local access to the server GoCD Server or Agent are installed on to modify executables or components of the installation. This does not affect zip file-based installs, installations to other platforms, or installations inside `Program Files` or `Program Files (x86)`. This issue is fixed in GoCD 22.2.0 installers. As a workaround, if the server or agent is installed outside of `Program Files (x86)`, verify the the permission of the Server or Agent installation directory to ensure the `Everyone` user group does not have `Full Control`, `Modify` or `Write` permissions.
[ { "commit_message": "[PATCH] Add NSIS AccessControl plugin to set permissions on install dir From https://nsis.sourceforge.io/AccessControl_plug-in adding ANSI version (i386) since that's we are using for now. installers/windows/go-base.nsi | 17 +++++++++++++++++ .../windows/nsis-plugins/Access...
CWE-284: Improper Access Control
CVE-2011-4098
The fallocate implementation in the GFS2 filesystem in the Linux kernel before 3.2 relies on the page cache, which might allow local users to cause a denial of service by preallocating blocks in certain situations involving insufficient memory.
[ { "commit_message": "[PATCH] GFS2: rewrite fallocate code to write blocks directly GFS2's fallocate code currently goes through the page cache. Since it's only writing to the end of the file or to holes in it, it doesn't need to, and it was causing issues on low memory environments. This patch pulls in some of ...
n/a